Improved Signcryption Algorithm for Information Security in Networks
نویسنده
چکیده
In a Cryptographic primordial, the functions of the digital signature and the public key encryption are concurrently carried out. To safely communicate incredibly large messages, the cryptographic primordial known as the signcryption is effectively employed. Though a lion’s share of the public key based mechanism are appropriate for miniature messages, the hybrid encryption (KEM-DEM) offers a proficient and realistic method. In this document, we are cheered to launch an improved signcryption method, which takes cues from the KEM and DEM approaches. The KEM algorithm employs the KDF approach to summarize the symmetric key. The DEM algorithm makes use of the Elliptic curve cryptography technique to encrypt the original message. With an eye on safety aspects, we have testes three attacks and we are cheered to state that the attackers have failed miserably in locating the safety traits of our improved signcryption technique. Index Terms – Cryptographic, Signcryption, KEM, DEM, KDF.
منابع مشابه
Cryptanalysis and improvement of a dynamic and secure key management model for hierarchical heterogeneous sensor networks
In 2012, Alagheband and Aref presented a dynamic and secure key management model for hierarchical heterogeneous sensor networks. They proposed a signcryption algorithm which is the main building block in their key management model. They proved the algorithm is as strong as the elliptical curve discrete logarithm problem. In this work, we study the security of their signcryption algorithm. It is...
متن کاملDynamic and secure key management model for hierarchical heterogeneous sensor networks
With the development of the wireless communication technology and the sensor technology, the wireless sensor network (WSN) has been used in many applications. However, WSNs suffer from some inherent weaknesses because of restricted communication and hardware capabilities. To achieve essentially secure communication in WSNs, a few of key management models have been proposed since it is the cruci...
متن کاملCertificateless aggregate signcryption: Security model and a concrete construction secure in the random oracle model
Certificateless cryptography; Aggregate signcryption; Random oracle model; Bilinear pairing Abstract The concept of aggregate signcryption was first introduced in 2009 by Selvi et al. [Identity based aggregate signcryption schemes, Lecture Notes in Computer Science 5922 LNCS, 2009, pp. 378–397]. The aggregation process of these schemes reduces the amount of exchanged information and is particul...
متن کاملSigncryption Approaches for Network Security
Signcryption is a new public key cryptography approach to combine digital signature and encryption functionalities as a consequence of the growing consumer demand for information security. The necessity to achieve confidentiality, integrity, authenticity and non-repudiation properties in data communication that motivates new demands for signcryption schemes. The framework of signcryption involv...
متن کاملSecurity Analysis in Body Area Networks using Attribute-based Ring Signcryption Scheme
At present, Body Area Networks (BANs) are budding as one of the major research interests, predominantly in the field of personal health monitoring. In view of the fact that health data are extremely private and includes sensitive details, the security of data transmission inside a BAN turns out to be a critical issue that needs instant attention. In this study, Attribute-based Ring Signcryption...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2015